
Three held in Delhi for routing ₹1.5 Crore cyber fraud through mule accounts
In a significant breakthrough against cybercrime, Delhi Police have arrested three individuals for allegedly operating a network of mule accounts to channel proceeds of online fraud amounting to over ₹1.5 crore.
The accused identified as Deepak (32), Krishan Pratap Singh (28) and Shashi Kant (28) were apprehended following a detailed investigation triggered by a suspicious bank account flagged for its links to multiple cyber fraud complaints registered across various states.
According to police officials, technical surveillance and transaction analysis revealed that the account was part of an organised syndicate designed to receive and divert funds obtained through fraudulent activities. “The account was being used to route cheated money, which was further transferred through multiple layers to conceal its origin,” a senior officer said.
The probe initially led to the arrest of one accused, who subsequently disclosed the involvement of his associates. Acting on this information, police tracked down and apprehended the remaining suspects.
Investigators found that the group allegedly targeted unemployed individuals, luring them with small commissions to open bank accounts. These accounts commonly referred to as “mule accounts” were then used to transfer and circulate illicit funds, making it difficult for authorities to trace the money trail.
During the operation, police recovered mobile phones containing crucial digital evidence, including chats and transaction details, along with SIM cards linked to the accounts. Cheque books and documents of fictitious firms were also seized, further establishing the accused’s role in facilitating cyber fraud.
Officials explained that mule accounts act as intermediaries in financial crimes, allowing fraudsters to move stolen money through multiple channels, a process known as layering, to evade detection.
A case has been registered, and further investigation is underway to identify other members of the network and uncover the full extent of the operation.
